Search Results - buffer-overflow vulnerability detection
-
1
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
ISSN: 0924-669X, 1573-7497Published: New York Springer US 01.06.2023Published in Applied intelligence (Dordrecht, Netherlands) (01.06.2023)“…Automatically detecting buffer overflow vulnerabilities is an important research topic in software security…”
Get full text
Journal Article -
2
Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation
ISSN: 1742-6588, 1742-6596Published: Bristol IOP Publishing 01.06.2020Published in Journal of physics. Conference series (01.06.2020)“… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation…”
Get full text
Journal Article -
3
BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis
ISSN: 1939-0114, 1939-0122Published: London Hindawi 22.06.2022Published in Security and communication networks (22.06.2022)“…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems…”
Get full text
Journal Article -
4
Smart fuzzing method for detecting stack-based buffer overflow in binary codes
ISSN: 1751-8806, 1751-8814, 1751-8814Published: The Institution of Engineering and Technology 01.08.2016Published in IET software (01.08.2016)“…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems…”
Get full text
Journal Article -
5
Binary Static Analysis-based Buffer Overflow Vulnerability Detection Technique using Function Prologue and Epilogue
ISSN: 2383-6318, 2383-6326Published: 31.10.2024Published in KIISE Transactions on Computing Practices (31.10.2024)Get full text
Journal Article -
6
Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution
Published: IEEE 18.08.2023Published in 2023 4th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC) (18.08.2023)“…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow vulnerability is of utmost importance…”
Get full text
Conference Proceeding -
7
A combinatorial approach to detecting buffer overflow vulnerabilities
ISBN: 9781424492329, 1424492327ISSN: 1530-0889Published: IEEE 01.06.2011Published in 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)“… In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities…”
Get full text
Conference Proceeding -
8
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Published: IEEE 01.06.2023Published in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (01.06.2023)“… open-source code containing millions of functions with potential buffer overflow exploits…”
Get full text
Conference Proceeding -
9
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
ISSN: 2523-3246, 2523-3246Published: Singapore Springer Singapore 08.09.2020Published in Cybersecurity (Singapore) (08.09.2020)“…The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems…”
Get full text
Journal Article -
10
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities
ISBN: 0780382307, 9780780382305ISSN: 1542-1201Published: Piscataway NJ IEEE 2004Published in 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507) (2004)“… In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits…”
Get full text
Conference Proceeding -
11
PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation
ISBN: 9798350361919ISSN: 1844-7872Published: IEEE 16.05.2024Published in 2024 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR) (16.05.2024)“…Automated detection tools play a crucial role in assisting researchers to identify and rectify existing software flaws…”
Get full text
Conference Proceeding -
12
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Published: IEEE 01.03.2019Published in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (01.03.2019)“… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA…”
Get full text
Conference Proceeding -
13
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2021Published in IEEE access (2021)“… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs…”
Get full text
Journal Article -
14
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 01.06.2023Published in arXiv.org (01.06.2023)“… open-source code containing millions of functions with potential buffer overflow exploits…”
Get full text
Paper -
15
What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability
ISSN: 2640-4265, 2640-4273Published: Hershey IGI Global 01.07.2018Published in International journal of systems and software security and protection (01.07.2018)“…Buffer overflow (BO) is a well-known and widely exploited security vulnerability…”
Get full text
Journal Article -
16
Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
ISSN: 0361-7688, 1608-3261Published: New York Springer Nature B.V 01.07.2005Published in Programming and computer software (01.07.2005)“…In this paper, a new static method for automated detection of vulnerabilities that could result in buffer overflows in programs is suggested…”
Get full text
Journal Article -
17
Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test
Published: IEEE 11.12.2020Published in 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (11.12.2020)“… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow…”
Get full text
Conference Proceeding -
18
Poster: Analytical Study on Large Language Models' Detection Capability for Buffer Overflow and Integer Overflow Vulnerabilities
ISSN: 2158-9208Published: IEEE 10.10.2025Published in Proceedings of the ... International Symposium on Parallel and Distributed Processing with Applications (Print) (10.10.2025)“… However, systematic investigation of LLMs for buffer and integer overflows vulnerabilityies detection remains notably lacking…”
Get full text
Conference Proceeding -
19
A method for detecting buffer overflow vulnerabilities
ISBN: 9781612844855, 1612844855Published: IEEE 01.05.2011Published in 2011 IEEE 3rd International Conference on Communication Software and Networks (01.05.2011)“… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting…”
Get full text
Conference Proceeding -
20
Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities
Published: IEEE 01.05.2015Published in 2015 IEEE/ACM 10th International Workshop on Automation of Software Test (01.05.2015)“… Despite existence of many detection solutions, buffer overflow bugs are widely being reported in multitude of applications suggesting either inherent limitations in current solutions or problems…”
Get full text
Conference Proceeding

